成长值: 64925
|
题目不是很完整,答案仅供参考/ F. ^. H0 N O$ B
& w3 l s- Z' F# M7 M# v, n5 rQuestion 01:( i' V# Y6 r, m/ K
Witch access list entry checks for an ACK within a packet header?
, B) X! k& x/ g8 X+ k' a) h( nA access-list 49 permit ip any any eq 21 tcp-ack" N. S! o8 ]# `! v6 w! A. A
B access-list 49 permit tcp any any eq 21 tcp-ack
( b7 H9 ^& u+ Y6 m3 D4 @C access-list 149 permit tcp any any eq 21 established
4 J0 G9 O% i: u% Z2 s/ g. n6 SD access-list 49 permit tcp any any eq 21 established# j3 c, t, p) G8 f/ u) h
Ans: C
' ?, U3 ^6 v" Q; w N———————————————————————————* M; a( @4 W+ C- ^1 |, v, J
Question 02:
4 L- S/ T" o& ], l3 ?: g8 V- RWhich option is one way to mitigate symmetric routing on an active/active firewall setup for TCP-based connections?# f0 w5 W2 `& W; Q+ W9 h5 W6 S8 Z
A performing packet captures
! z/ e! R) X; r) Z1 f% I- mB disabling asr-group commands on interfaces that are likely to receive asymetric traffic& ?- q$ [ I9 S
C replacing them with redundant routers and allowing load balancing7 J3 g, X7 @& d2 ]7 l: Y/ V* c2 o
D disabling stateful TCP checks' E, u p: W. t/ M7 @, A, ?( b
Ans: D$ @) M4 l0 z" \! {2 Q
# q* V4 k! \3 R& i( N: \8 W
" Z* q! V8 M: @/ Z |
|